CPC H04L 63/0861 (2013.01) [G06F 18/22 (2023.01); G06F 21/32 (2013.01); G06F 21/45 (2013.01); G06V 40/50 (2022.01)] | 19 Claims |
1. A method for authenticating a user comprising:
receiving a first request to authenticate the user for access to a third-party application;
receiving a first security threshold from a third party associated with the third-party application, the first security threshold comprising a minimum authentication score required to access the third-party application;
receiving first user authentication data for a first biometric authentication modality;
determining a first authentication score based on a comparison of the first user authentication data with previously-determined biometric data;
providing to the user, access to the third-party application based on a comparison of the first authentication score with the first security threshold;
receiving a second request to authenticate the user for an operation within the third-party application;
receiving a second security threshold from the third party, the second security threshold comprising a minimum authentication score required to perform the operation within the third-party application and a second biometric authentication modality, the second biometric authentication modality selected from a subset of biometric authentication modalities based on a location or surroundings of the user, the subset of biometric authentication modalities prescribed by the third party for the operation within the third-party application, wherein the second security threshold is greater than the first security threshold and the first authentication score;
receiving second user authentication data for the second biometric authentication modality, wherein the second biometric authentication modality is different than the first biometric authentication modality;
determining a second authentication score based on a comparison of the second user authentication data with the previously-determined biometric data; and
allowing the user to perform the operation within the third-party application based on determining that the second authentication score satisfies the second security threshold.
|